First published: Fri Oct 04 2024(Updated: )
IBM Sterling B2B Integrator Standard Edition 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2 allow an attacker on the local network to execute arbitrary code on the system, caused by the deserialization of untrusted data.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM B2B Sterling Integrator | <=6.2.0.0 - 6.2.0.2 | |
IBM B2B Sterling Integrator | <=6.0.0.0 - 6.1.2.5 | |
IBM Sterling B2B Integrator | >=6.0.0.0<=6.1.2.5>=6.2.0.0<=6.2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31903 is considered a critical vulnerability due to the potential for remote code execution on vulnerable systems.
To fix CVE-2024-31903, upgrade IBM Sterling B2B Integrator Standard Edition to version 6.2.0.3 or later.
CVE-2024-31903 affects IBM Sterling B2B Integrator Standard Edition versions 6.0.0.0 through 6.1.2.5 and 6.2.0.0 through 6.2.0.2.
Yes, CVE-2024-31903 can be exploited by attackers on the local network to execute arbitrary code.
CVE-2024-31903 is caused by the deserialization of untrusted data in vulnerable versions of the software.